Sciweavers

12478 search results - page 2490 / 2496
» Secure Interaction Design
Sort
View
EMSOFT
2010
Springer
15 years 12 days ago
From high-level component-based models to distributed implementations
Constructing correct distributed systems from their high-level models has always been a challenge and often subject to serious errors because of their non-deterministic and non-at...
Borzoo Bonakdarpour, Marius Bozga, Mohamad Jaber, ...
140
Voted
ICDE
2010
IEEE
178views Database» more  ICDE 2010»
15 years 11 days ago
The Hybrid-Layer Index: A synergic approach to answering top-k queries in arbitrary subspaces
In this paper, we propose the Hybrid-Layer Index (simply, the HL-index) that is designed to answer top-k queries efficiently when the queries are expressed on any arbitrary subset ...
Jun-Seok Heo, Junghoo Cho, Kyu-Young Whang
116
Voted
ICIP
2010
IEEE
15 years 10 days ago
Decoding positional and color information from a coded pattern
: The paper presents decoding positional and color information using visual coded patterns for efficient geometric calibration and color consistency across multiple cameras. The pa...
Nelson L. Chang, Suk Hwan Lim, Feng Tang
121
Voted
MICRO
2010
IEEE
140views Hardware» more  MICRO 2010»
15 years 9 days ago
Moneta: A High-Performance Storage Array Architecture for Next-Generation, Non-volatile Memories
Emerging non-volatile memory technologies such as phase change memory (PCM) promise to increase storage system performance by a wide margin relative to both conventional disks and ...
Adrian M. Caulfield, Arup De, Joel Coburn, Todor I...
SOFTVIS
2010
ACM
15 years 8 days ago
Dependence cluster visualization
Large clusters of mutual dependence have long been regarded as a problem impeding comprehension, testing, maintenance, and reverse engineering. An effective visualization can aid ...
Syed S. Islam, Jens Krinke, David Binkley
« Prev « First page 2490 / 2496 Last » Next »